Conferences

Search results

    TitleConferenceSpeaker(s)
    "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and CountryUSENIX Security '22Kovila P.L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini
    Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress MarketplacesUSENIX Security '22Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
    Web Cache Deception Escalates!USENIX Security '22Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo
    Exploring the Unchartered Space of Container Registry TyposquattingUSENIX Security '22Guannan Liu, Xing Gao, Haining Wang, Kun Sun
    LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic ExecutionUSENIX Security '22Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi
    Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow MonitoringUSENIX Security '22Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman Zonouz
    Secure Poisson RegressionUSENIX Security '22Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
    Under the Hood of DANE Mismanagement in SMTPUSENIX Security '22Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung "Ted" Kwon, Taejoong Chung
    The Dangers of Human Touch: Fingerprinting Browser Extensions through User ActionsUSENIX Security '22Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis
    Poisoning Attacks to Local Differential Privacy Protocols for Key-Value DataUSENIX Security '22Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
    Breaking Bridgefy, again: Adopting libsignal is not enoughUSENIX Security '22Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson
    Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship MeasurementUSENIX Security '22Abhishek Bhaskar, Paul Pearce
    Communication-Efficient Triangle Counting under Local Differential PrivacyUSENIX Security '22Jacob Imola, Takao Murakami, Kamalika Chaudhuri
    Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change RequestsUSENIX Security '22Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao
    OS-Aware Vulnerability Prioritization via Differential Severity AnalysisUSENIX Security '22Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu
    OpenVPN is Open to VPN FingerprintingUSENIX Security '22Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page WalkerUSENIX Security '22Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas
    Watching the watchers: bias and vulnerability in remote proctoring softwareUSENIX Security '22Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney
    Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in PracticeUSENIX Security '22Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye
    The Antrim County 2020 Election Incident: An Independent Forensic InvestigationUSENIX Security '22J. Alex Halderman
    How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account DeletionUSENIX Security '22Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing
    Open to a fault: On the passive compromise of TLS keys via transient errorsUSENIX Security '22George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow
    "Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy AdviceUSENIX Security '22Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner
    Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting PreventionUSENIX Security '22Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis
    Helping hands: Measuring the impact of a large threat intelligence sharing communityUSENIX Security '22Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom Van Goethem, Carlos H. Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten

Pages